OneDrive Off A Cliff

In my last blog, I posted about the value of implementing two-factor authentication (2FA) as a significant enhancement to the security of the traditional username/password authentication method.  The availability of free authentication applications like Google Authenticator, Authy, and FreeOTP (there are many more), and the ever growing list of public websites that now support these … Read moreOneDrive Off A Cliff

Security Training Awareness: Create A Plan and Track Effectiveness

email security on laptop

As robust as your organization’s security program, policies, and toolsets are, there is still one vulnerability that even the most secure IT department cannot control – your employees. Cybercriminals rely on the fact that many employees are inadequately trained and underestimate the risks of phishing scams and ransomware.  With over 53,000 security incidents and more … Read moreSecurity Training Awareness: Create A Plan and Track Effectiveness

Top 10 Things We Can Learn from the Target Breach

cyber-security

For those of you not familiar with the SANS Institute http://www.sans.org, the SANS Institute was established in 1989 as a cooperative IT security research and education organization that today reaches more than 165,000 security professionals around the world.  It is a tremendous resource for everything related to IT security, and I highly encourage any organization or individual … Read moreTop 10 Things We Can Learn from the Target Breach

The Legendary Router Malware

router and cables

When diagnosing your computer’s security problems, it should be noted that malware is not always located on the PC itself. A lot of the time, problems could be occurring in a number of different operating systems and browsers, making it difficult to diagnose the cause. A recent study by Ronald Kaplan and Dylan Kaplan proved … Read moreThe Legendary Router Malware

Take Care of Your Computer and it Will Take Care of You

computer maintenance service repair

When it comes to owning anything expensive, it’s important to practice proper maintenance. One of the most basic things you can do to take better care of your computer is to periodically examine the software on your computer. Although software maintenance can be challenging at times, it can be incredibly rewarding. It doesn’t have to … Read moreTake Care of Your Computer and it Will Take Care of You

Internet Explorer 8 Zero-Day Vulnerability Found, but Not Patched

virus network icon

With the world still on edge about the recent vulnerability found in most versions of Internet Explorer, another one has been discovered, this time in Internet Explorer 8. This bug allows a hacker to execute malicious code when a user opens an infected email or webpage. However, this vulnerability is different than the one previously … Read moreInternet Explorer 8 Zero-Day Vulnerability Found, but Not Patched

Urgent: Protect Yourself Against Heartbleed

heartbleed bug icon

April 7th 2014 was a big day for the world, not only because Microsoft ended security support for Windows XP, but because a massive security flaw was found in the OpenSSL cryptographic library. This problem, called the Heartbleed bug, was found by Google Security, and it leaks information from any applications and services utilizing OpenSSL. The problem, … Read moreUrgent: Protect Yourself Against Heartbleed

Cloud Safety Presents New Options for Businesses

cloud security icon

Admit it, you’ve thought about moving some of your computing infrastructure to the cloud, but just couldn’t take the leap because there is a perception out there that suggests cloud-based computing systems are less secure than the ones that you house within the confines of your office. The fact of the matter is that every piece of computing infrastructure … Read moreCloud Safety Presents New Options for Businesses

Is Your Word Document Leaking Secrets?

microsoft word icon

Just because you hit the delete button when using Microsoft Word doesn’t necessarily mean that your information is gone forever. Thanks to Word’s Track Changes feature, all of your deleted sentences can be easily retrieved. This is a very handy tool to help you out of a jam, but it can also be misused to … Read moreIs Your Word Document Leaking Secrets?

Are There Hackers Listening to You?

hacker face

Tech savvy individuals and businesses alike have moved away from traditional Internet browsers such as Microsoft’s Internet Explorer and Apple’s Safari to Google’s Chrome browser. After all, many people enjoy having a simplistic, yet powerful web browser that easily integrates it’s Google Docs tools and Gmail email service. However, users may want to think twice … Read moreAre There Hackers Listening to You?

We use cookies to gather information about the way you interact with our website, to create reports, and overall help us in improving the website. To learn more about our cookie policy, view our Privacy Policy. By clicking “Accept & Close”, you consent to the use of cookies unless you have disabled them.